June grade 12 terminology Flashcards
4G (LTE)
4G is the fourth generation of cellular wireless standard and is a successor to 3G. 4G
networks use different frequencies to transmit data and should achieve far higher speeds that
3G.
64-bit
64-bit computers have a processor that work with 64 bits at a time. This means that memory
addresses, register sizes, address and data bus sizes and instruction sizes are all 64 bits in
length. In other words the computer is able to process at most 64 bits of data at once.
Access point
Also called a base station, consists of a sender/receiver (transceiver) and an antenna which
transmits and receives radio signals so that the devices that have a wireless network card are
able to communicate with the rest of network.
Activation codes
A series of letters and digits that must be entered during software installation to authenticate
that copy of the software.
ADSL
Asymmetric digital subscriber line Digital Subscriber Line. Used by homes and businesses
for dedicated dig ital high speed connection to the internet over conventional phone lines.
Adware
Software that automatically displays or downloads advertising material such as banners or
pop- ups when a user is online.
Anomalies
Errors which occur when editing a database that has not been normalised. They include
UPDATE, INSERT and DELETE anomalies.
Anti virus software
Anti-virus software is a program or set of programs that are designed to detect, prevent and
remove software viruses, and other malicious software.
API
Application Programming Interface. The form of an API varies depending on the type of
programming language but often it is a library of programming modules which facilitate the
creation of applications which communicate with the Operating System.
Archive
To copy and compress data files to a long-term storage medium.
BitTorrent
BitTorrent is a peer-to-peer (P2P) file sharing protocol designed to reduce the bandwidth
required to transfer files. For example, if a user begins downloading a movie file, the
BitTorrent system will locate multiple computers with the same file and begin downloading
the file from several computers at once.
Artificial Intelligence
Simulation of human decision-making processes by a computer system.
Assembler
A program that translates a programmer’s code, written in Assembly Code, into executable
machine code.
BIOS
Basic Input Output System – the essential start up instructions of a computer, stored in ROM
on the motherboard.
Blockchain
A system in which a record of transactions made in bitcoin or another cryptocurrency are
maintained across several computers that are linked in a peer-to-peer network.
Asymmetric
Encryption
Cryptographic algorithms (keys) which comprise of two separate keys, one of which is secret
(or private) and one of which is public. The pair of keys are mathematically linked but one
cannot be derived from the other, i.e. if a user has the public key he cannot work out the
private key (or vice versa).
Attenuation
Attenuation is the reduction in signal strength while transmitting data. The further the signal
gets from the source the weaker it will become.
Audio and Video on
Demand (AVOD)
Video on demand (VOD) or audio and video on demand (AVOD) are systems which allow
users to select and watch/listen to video or audio content when they choose to, rather than
having to watch at a specific broadcast time.
AUP
Acceptable Usage Policy, a document that outlines the rights and responsibilities of users
within a network environment, including the consequences of violating these stipulations.
Audit trail
An audit trail (also called audit log) is a security-relevant chronological record, set of
records, and/or destination and source of records that provide documentary evidence of the
sequence of activities that have affected at any time a specific operation, procedure, or event.
Backup
A copy of data files and other relevant files stored to enable full restoration of service in the
event of data loss. There is a trend towards cloud based backup services.
Bandwidth
The total amount of data that can be transferred from one point to another in a given period
of time.
Biometrics
Security based on identification of unique physical characteristics of a person such as
fingerprints and retina.
Big Data
Big data is a combination of structured, semistructured and unstructured data collected by
organizations that can be mined for information and used in machine learning projects,
predictive modeling and other advanced analytics applications
Blog
A blog reads like a journal with the most recent entry at the top.
Botnets
Also known as a zombie army. A botnet is a group of computers which have been infected by
malware and are controlled from a server to run related software programs and scripts. Often
utilised to forward spam
HTTPS
Hypertext Transfer Protocol Secure (HTTPS) is a secure variant of HTTP that adds a layer of
security on the data in transit through a secure socket layer (SSL) whereby the entire
webpage is encrypted before transfer.
Bluetooth
A wireless technology that allows devices such as a mouse, printers and cellphones to
communicate over a relatively short distance, typically less than 10 m.
HTTP
HyperText Transfer Protocol is an application-layer protocol used to transmit Hypertext on
the internet.
Control unit
The Control Unit (CU) section of the CPU directs all CPU operations. It controls the fetch
execute cycle and sequence of operations and interprets the instructions.
Cookie
A collection of information, stored in a small text file on the local computer of a person using
the World Wide Web, used chiefly by websites to identify users who have previously
registered or visited the site.
Bridge
Device that links two networks segments and can reduce network traffic.
Buffer
A ‘data buffer’ is a region of memory which is used to temporarily hold data while it waits for
some form of further processing often by a slower or busier device that cannot handle the
data immediately.
Bus
A set of electrical paths etched on a motherboard to transport data, instructions or addresses
between components on the motherboard.
Cache memory
Instructions and data are prefetched from slower RAM and placed cache in order to speed up
the CPUs processing. Cache memory is made up of SRAM chips.
Caching
The principle of using a faster device to speed up access from a slower device. For example
disk caching is where RAM is used to store blocks of data to speed up access from the slower
hard drive.
Cap
A bandwidth cap limits the total amount of data which can be downloaded over a given
period of time.
Check digit
Number added to a code (such as a bar code or account number) to verify that transmitted
data is received correctly. The check digit before transmission should remain the same on
the receipt.
Chipset
A chipset is a group of integrated circuits that work together. It is a set of chips used on a
motherboard to connect components. For example the Northbridge (connected to fast
components such as RAM) and the Southbridge (connected to slower components such as
the HDD).
Client-server
Client: A client is a computer terminal that retrieves information from or uses resources
provided by a server. Server: A powerful computer which provides services to clients on a
network.
Cloud Computing
Cloud computing is an Internet service which can provide on-line applications, store data
on-line and in a recent trend provide hardware for use on-line.
CMOS
Complementary Metal Oxide Semiconductor – A technology for producing the type of
memory that stores the various user configurable computer startup settings that can be
updated or changed.
Compiler
A program that translates an entire high level program source code into object code. The
object code is machine code which may be used to create standalone ‘executable files’.
Composite keys/
compound key
A composite key is a combination of two or more fields in a table to create a Primary Key.
Compression
Compression is the process of applying an algorithm to a file to reduce its size. Lossless
compression is where data is compressed without losing any portion of the data. It allows the
exact original data to be reconstructed. Lossy compression loses detail so that the file is not
restored to its original size.
GPU
Graphics Processing Unit – dedicated graphics processor on a graphics card, used to render
images stored in the RAM of the graphics card.
Hardware Interrupt
A signal to the CPU indicating a device needs attention. For example, a mouse click or a
keystroke.
HDMI
High-Definition Multimedia Interface for transferring high definition video and audio.
Hoaxes
An email that provides a warning about a virus, worm or some other disaster, and urges
recipients to forward the message thereby generating unnecessary traffic.
Hot-pluggable/Hotswappable
.
Hot plugging is the ability to replace or install a device without shutting down the attached
computer.
Hotspot
An area, usually in a public space such as an airport, restaurant or hotel lobby, where people
may receive and be granted WiFi access from an access point to connect wirelessly to the
Internet.
HTML
Hypertext Markup Language used to create webpages. The tags (<h1>This is a
heading</h1>) are translated by web browsers into the graphical representation shown on the
computer screen.
HTTP
HyperText Transfer Protocol is an application-layer protocol used to transmit Hypertext on
the internet
WeB LOG
Websites updated regularly with news and events in chronological order
Copyright
The exclusive legal right to reproduce, publish, sell, or distribute original work (such as
computer publications, graphics and software).
Cyber crimes
Criminal activity using computers on the Internet or any network.
Dark Web
The dark web is the part of the World Wide Web that is only accessible by means of special
software, allowing users and website operators to remain anonymous or untraceable. The
dark web forms a small part of the deep web, the part of the Web not indexed by web search
engines.
Data dependency
A data dependency in a database is where one field has a dependency or relationship with
another field. For example knowing a person’s ID number can produce their name.
Data Integrity
Data integrity refers to the overall completeness, accuracy and consistency of data.
Data mining
The use of sophisticated software to examine a large volume of information stored in many
databases on-line to discover patterns and trends. Usually aimed at transforming large
volumes of unstructured data in a form that can be used to make decisions.
Data redundancy
Data redundancy occurs in database systems where a field is repeated unnecessarily as a
result of a one-to-many or many-to-many relationship.
Data verification
Checking to ensure that captured data is a legitimate copy of inputted data. Performed when
data has been entered. For example inputting a password twice.
Data warehouse
A data warehouse is a database storing data from many sources over a period of time for
reporting and data analysis in order to make decisions.
Data structure
A data structure is a specialised format for organising and storing data in a program. General
data structure types include the array, the file, the record
Data validation
Checking that captured data is logically correct and falls within acceptable ranges for that
data. Validation is performed at the time of input.
Data verification
Checking to ensure that captured data is a legitimate copy of inputted data. Performed when
data has been entered. For example inputting a password twice.
Data warehousing
A data warehouse is a database storing data from many sources over a period of time for
reporting and data analysis in order to make decisions.
Database
management system
(DBMS)
Database Management System is software that provides database functionality to physical
users or client software that needs data. These systems are capable of storing large amounts
of structured data which can be easily queried and accessed using SQL or other similar
languages.
DDR Memory
Double Data Rate. A type of SDRAM which sends and receive signals twice per clock cycle
DDR Memory
Double Data Rate. A type of SDRAM which sends and receive signals twice per clock cycle
Defragmentation
The process of locating the non-contiguous fragments of data into which a computer file may
be divided as it is stored on a hard disk, and rearranging the fragments and restoring them
into fewer fragments or into the whole file.
Denial of service
attack (DoS)
A ‘denial-of-service’ attack is characterised by an explicit attempt by attackers to prevent
legitimate users of a service from using that service. Examples include attempts to ‘flood’ a
network, thereby preventing legitimate network traffic
Derived data
Data in the field of a database which has been created from two or more existing fields in the
database table, for example: calculating the age from the date of birth
Device driver
A device driver is a computer program that provides communication between the device and
the Operating System. A piece of software that controls a peripheral on a computer.
DHCP
The Dynamic Host Configuration Protocol is a standardised network protocol that is used by
network server to provide a unique IP address to all nodes as they join the network
Digital Divide
The digital divide refers to the difference between people who have easy access to the
Internet and IT resources and those who do not.
Digital signature
Data added to a file to authenticate its source. The Digital signature is verified by consulting
a Digital Authority organisation which keeps an original record of the signature.
Distributed
processing
Refers to a network setup where individual terminals have sufficient processing power to
complete their tasks without reference to a central powerful server (refer to Centralised
Processing).
Distributed database
A system where parts of a database (the data and the DBMS) are spread (distributed) across
servers in separate locations.
DNS (Domain Name
Service/ Server)
An Internet service that maps domain names to numerical IP addresses
Domanin name
Domain name A string that translates back to an IP address to allow access to a website.
DRAM
Dynamic RAM. A memory chip that uses capacitors and needs to be refreshed.
Duplicate data
Data that is repeated in the database for valid reasons. For example two people living in the same suburb
EEPROM
Electronically Erasable Programmable Read Only Memory – a type of ROM that can be
erased electronically, after which a new ‘image’ of the upgraded contents can be written back.
GPU
Graphics Processing Unit – dedicated graphics processor on a graphics card, used to render
images stored in the RAM of the graphics card.
Hardware interrupt
A signal to the CPU indicating a device needs attention. For example, a mouse click or a
keystroke
E-book
An electronic version of a printed book which can be read on a computer or a specifically
designed handheld device A publication/book made available in digital/electronic form.
Embedded Operating
System
A dedicated operating system installed in mobile handheld devices, appliances, equipment
and vehicles. Normally on a ROM chip.
EMI
Electro Magnetic Interference. The disruption of signal caused by proximity to an
electromagnetic field from another electronic device.
Emulation
Emulation is the process of duplicating the function of a computer system in a computer not
designed for that system, for example, running PC software on an Apple computer.
Encryption
Converting data into an unreadable form according to a specified set of rules to ensure the
privacy of data during communication, or for security purposes.
Ergonomics
The practice of designing equipment/furniture/etc. so that it minimises strain on the human
body, e.g. ergonomic keyboards, mouse, chairs, etc.
Ethernet
System for connecting a number of computer systems in a LAN, with reference to
communication protocols, transmission speeds and media, collision management and
hardware.
Extranet
An organisation’s intranet (or part thereof) which is available to other users outside the
organisation.
Fat Client
A computer with full CPU, memory, backing storage and local software connected to a
network using a Server-Client setup.
Firewall
Hardware and/or software that monitors the traffic between a computer and the Internet, to
safeguard against breaches in security.
Firewire
A high speed port developed by the Apple corporation to transfer high volume data such as
video
.
Firmware
Software that is permanently installed on a ROM chip.
Flaming
Posting or sending offensive messages over the Internet.
Flash memory
Flash memory
Flash memory is a type of EEPROM (electronically erasable programmable ROM) used in
memory cards, USB memory-sticks, music players, cell phones and solid-state drives.
Foreign keys
A field in a table (not a primary key) which contains data that exists in the primary key field
of another table. The mechanism by which relations are created between the tables of a
relational database.
Freeware
Software that is distributed freely. You do not receive the source code. There is no limitation
on the time or functionality included.
Front Side Bus
A high speed bus which connects the CPU and the Northbridge. The Northbridge connects to
faster components on the motherboard, primarily RAM.
FTP (File Transfer
Protocol)
The protocol used for the transfer of files between remote computers that have an Internet
connection.
GIGO
‘Garbage In, Garbage Out’; the quality of the output for any computer system is directly
related to the quality of the input.
Global Unique
Identifiers
A globally unique identifier (GUID) is a 128-bit number created by the Windows operating
system or another Windows application to uniquely identify specific components, hardware,
software, files, user accounts, database entries and other items. It is a term used by Microsoft
for a number that its programming generates to create a unique identity for an entity such as
a Word document.
Hybrid hard drives
Hybrid hard drives blend HDD capacity with SSD speeds by placing traditional rotating platters and a small amount of high-speed flash memory on a single drive. Hybrid storage products monitor the data being read from the hard drive, and cache the most frequently accessed bits to the high-speed NAND flash memory.
Hyper threading
Hyperthreading (HT) technology uses two sets of registers on the CPU to simulate a second CPU allowing for fast context switching between processes.
IAAS
Infrastructure as a Infrastructure as a service is where computer resources, such as hardware, software and networks are owned and hosted by a service provider and offered to customers on- demand.
Interactive processing
Interactive processing is where a program produces output in response to input while the program is running.
Interpreters
Software that translates programming instructions into machine code one line at a time and executes them immediately.
Interrupt
A signal sent to the CPU indicating that a device or process needs attention.
Intranet
An organisation’s internal web site that usually provides access to various documents and
resources.
IP address
An address for a device in a TCP/IP network.
IrDA
The Infrared Data Association (IrDA) is a set of protocols for wireless infrared
communications.
ISP
ISP Internet Service Provider. A company which provides access to the Internet.
Json
JavaScript Object Notation is a platform-independent, human readable, text file used for
transferring data between web services and browsers or applications
Keylogger
Malware that sits in a computer’s memory without the users knowledge and records
keystrokes and then sends them to a remote computer. Used to find usernames, passwords,
etc.
LBS (Location
Based Services)
Software applications that make use of GPS-enabled devices’ locations to provide more
relevant information to users. A piece of software that uses data about your physical position
to control features of an application.
MAC Address
Media Access Control address. A unique identifier assigned to a network device by the
manufacturer (e.g. a network card or wireless router), for example, B1:3C:45:AC:8D:FF (6
groups of hexadecimal numbers).
Machine Cycle
Steps taken by the CPU in carrying out instructions: Fetching instructions and data from the
memory (RAM); Decoding the instructions; Executing the instruction; Transferring data
back to the memory.
Malware
Malicious software installed without users’ knowledge and designed to negatively affect the
operation of a computer system.
Microblog
The posting of short text entries usually via a cellphone or smartphone, on a platform like
Twitter.
Microwave
transmission
A high speed line of sight technology for wireless connection. (A microwave refers to
electromagnetic energy having a frequency higher than 1 gigahertz)
Modular design
A computer design philosophy which incorporates a variety of re-usable stand-alone
components, thereby facilitating upgrades and maintenance.
MPEG
The digital compression standards and file formats developed by the Moving Picture Experts
Group. MPEG-4 is the latest standard.
Multi Core
A technology where 2 or more complete microprocessors are built into a single CPU chip,
e.g. Dual-core; Quad-core.
Multi-processing
Processing technique where multiple tasks are processed on more than one physical
processor/core.
Multi-tasking
Descriptive of an operating system which can execute two or more independent task
simultaneously, as in multicore and hyperthreading, or the OS can appear to run two or more
tasks simultaneously in a single CPU by Time-Slicing
Multi-threading
The ability of a program to create independent parts called threads. For example
downloading a file in a web browser while searching for a web page. When a CPU has
multiple cores, each thread can be run on a different core at the same time
Netiquette
Netiquette is etiquette on the internet. It is a set of rules which specify appropriate behaviour
when communicating over the internet.
Network backbone
A part of a network that connects all other parts of the same network together.
Normalisation –
1NF, 2NF, 3NF
The process of designing a database by splitting the data into related tables to reduce data
redundancies and to avoid anomalies such as update, insert and delete which threaten the
integrity and usability of the database.
Northbridge
Part of a chipset by Intel which controls the communication between the CPU, Primary
memory and the faster components on the motherboard, e.g. accelerated graphic ports and
PCI.
Onion routing
Onion routing is a technique for anonymous communication over a computer network. In an
onion network, messages are encapsulated in layers of encryption, analogous to layers of an
onion. The encrypted data is transmitted through a series of network nodes called onion
routers, each of which “peels” away a single layer, uncovering the data’s next destination.
Overclocking
Overclocking is the process of making a computer or component operate faster than the clock
frequency specified by the manufacturer by modifying system parameters. Most
overclocking techniques increase power consumption, generating more heat, which must be
dispersed if the chip is to remain operational.
PAAS
Platform as a Service is part of cloud concept that provides a computing platform for the
development of software by users
Parallel Sets
Parallel Sets (ParSets) is a visualization application for categorical data, like census and
survey data, inventory, and many other kinds of data that can be summed up in a
cross-tabulation
Parallel Sets
Parallel Sets (ParSets) is a visualization application for categorical data, like census and
survey data, inventory, and many other kinds of data that can be summed up in a
cross-tabulation
Parameters
A list of data which is passed into a method, procedure or function. Usually each parameter
has a name and type associated with it, shown in the brackets after a method, procedure or
function name
PCI Express
PCI Express is bus design for communication between CPU, memory. It uses serial
connections and a switch to provided dedicated point-to-point link between components on a
motherboard
Peer-to-peer network
A network in which each workstation has the same rights. Each
terminal controls the files on
its local drive and attached hardware determining whether it may be shared by others on the
network. It is characterised by the absence of a server.
Peripheral
Any computer hardware device, such as a printer, that you connect to your PC via an USB
Port. It is not part of the essential computer, i.e. the memory and microprocessor.
Pharming
When a hacker attempts to redirect your web traffic to a fake Web site that looks legitimate.
The fake Web site requests you to enter confidential information.
Phishing
Attempts from people, generally employing e-mail with links, to direct users to fake
websites, where they are tricked into releasing personal information (e.g. passwords)
Plug and Play
A technology that automates the installation and configuration process of a new device.
Plug-ins
Programs which add extra features to software, such as a web browser. These programs are
needed to allow the user to view ‘special’ effects.
Podcast
Audio/Video files that are designed to be downloaded and played on mobile devices such as
an iPod.
Polymorphism
In object-oriented programming, polymorphism refers to a programming language’s ability to
process objects differently depending on their data type or class. For example, see method
overriding and method overloading. Methods which have the same signature but different
functionality.
POP3 (Post Office
Protocol 3)
The most common protocol used for downloading e-mail via the Internet from POP3 servers.
Portal
A Web portal or public portal refers to a Web site or service that offers a broad array of
resources and services, such as e-mail, forums, search engines, and online shopping malls.
Portal
A Web portal or public portal refers to a Web site or service that offers a broad array of
resources and services, such as e-mail, forums, search engines, and online shopping malls.
POS
Point Of Sale software. The software used to manage tills in shops and supermarkets.
Usually linked to some form of stock control software.
POST
.
Power On Self Test – start-up test performed by the BIOS to ensure that all essential
hardware (RAM, keyboard, etc.) is present and in working order.
Primary key A field or combined fields which act as a unique identifier of a record.
Protocol A set of rules and regulations which govern data transmission.
Proxy server
A server in an organisation to cache web pages in order to reduce network traffic. All
subsequent requests to the same site on the Internet will be provided by the proxy server.
RAD
Rapid Application Development is a software development methodology that uses minimal
planning in favour of rapid prototyping. The lack of extensive pre-planning generally allows
software to be written much faster, and makes it easier to change requirements
RAID
Redundant Array of Inexpensive/Independent Disks – the configuration of two or more hard
drives to act as one large storage utility, designed to minimise the possibility of data loss by
storing the data across all of the Disks (Data Striping) and providing a redundant copy of the
data (Mirroring).
Range check
A method of checking the validity of input data by determining whether the values fall
within an expected range.
Ransomware
Ransomware is a type of malicious software from cryptovirology that threatens to publish the
victim’s data or perpetually block access to it unless a ransom is paid.
Registers
A register is a small amount of storage space on a CPU to store the current instruction to be
processed.
Remote Access
In computer networking, remote access technology allows logging into a system as an
authorised user without being physically present at its keyboard.
Repeater
A repeater is an electronic device that receives a signal and boosts it at a higher level or
higher power so that the signal can cover longer distances
RFID
.
Radio-frequency identification (RFID) is the wireless use of radio-frequency electromagnetic
fields to transfer data, for the purposes of automatically identifying and tracking tags
attached to objects.
RIA (Rich Internet
Applications)
A web application that is designed to deliver the functions and features of a traditional
desktop application. Web browsers are required for access. Unlike traditional applications,
the installation of software is not needed.
ROM
Read-Only Memory is non-volatile memory chip where the contents are retained after power
is switched off.
Rootkit
Collection of programs designed to use administrator rights to gain control of a computer for
malicious purposes.
Router
A device that makes it possible for networks to communicate over the Internet, by directing
data packets to its correct destination by determining the best path. The global standard
routing is TCP/IP.
RSI
Repetitive Strain Injury are injuries caused by repetitive tasks, for example, prolonged use of
the mouse causing Carpal Tunnel Syndrome in the wrist.
SAAS
Software as a service is a software delivery model in cloud computing in which software and
associated data are centrally hosted on the cloud by independent software vendors (ISVs) or
application service providers (ASPs), e.g. Google Apps.
SATA
An interface suitable for connecting a hard disk drive.
SATA
An interface suitable for connecting a hard disk drive.
Semantic Search
Engine
Semantic search is a data searching technique in a which a search query aims to not only find
keywords, but to determine the intent and contextual meaning of the words a person is using
for search in order to return more relevant results.
Server Virtualisation
Server virtualisation is the act of replacing the functions of several separate physical servers
with one piece of hardware. Several instances of server operating system can be installed on
this virtual host. This provides for more efficient use of the hardware and energy and allows
for fault tolerance.
Siphoning
Siphoning is a technique used to fraudulently redirect traffic that would normally be directed
to website in search engine results.
SMTP (Simple Mail
Transfer Protocol)
The most common protocol used for sending e-mail via SMTP servers on the Internet.
Social Engineering
Any attempt to manipulate someone into installing malware or giving out sensitive or
personal information.
Social Engineering
Any attempt to manipulate someone into installing malware or giving out sensitive or
personal information.
Software Interrupt
A signal to the CPU by a program or process indicating a program experiencing a problem
such as invalid user input, or a divide by 0 error.
Southbridge
The Southbridge is one of the two chips in the core logic chipset on a personal computer
motherboard, the other being the Northbridge. The Southbridge connects slower components
such as the HDD.
Spoofing
The substitution of email or web site addresses with false addresses in order to make a email
or web site appear legitimate.
Spyware
A form of malware that tries to monitor and track the way you use your computer to discover
confidential information, and then relay this to a third party. Keyloggers are an example of
Spyware
SRAM
Static Random Access Memory is memory that does not require constant refreshing of the
data it stores. This makes it faster than dynamic RAM as clock cycles aren’t spent refreshing
data.
SSL
Secure Sockets Layer is a protocol for transmitting private documents via the Internet. SSL
encrypts data before sending.
Streaming
The progressive download of files (usually video or audio) over the internet. The file is not
saved to your device. On-demand services for audio and video are available.
Voice over Internet
Protocol (VoIP)
A protocol that allows telephone calls to be made over LANs, WANs and the Internet
Switch
An Ethernet Switch is device used to manage network collisions and to act as physical
connection point for network cabling.
Synchronise
The process where data files on different devices are updated with the latest copy so that both
versions of the files are identical.
System Clock
A small quartz crystal that pulses at a regular frequency measured in GHz; used to coordinate
activities on a motherboard.
System Utility
TCP/IP TCP/IP is a protocol suite that is widely used to transmit information in networks.
A program that performs a very specific task, usually related to managing system resources.
System software performs ‘housekeeping like’ tasks.
Thin Client
A computer on a network with reduced CPU, memory and storage. Relies on a powerful
server on the network to perform most of these functions. Some thin client solutions have no
storage at all.
Thunderbolt
A fast connection technology replacing firewire and offering speeds of 10Gbs.
Tor
Tor is free software for enabling anonymous communication. The name is derived from an
acronym for the original software project name “The Onion Router”. Tor directs Internet
traffic through a free, worldwide, volunteer overlay network consisting of more than seven
thousand relays to conceal a user’s location and usage from anyone conducting network
surveillance or traffic analysis.
A microblog which limits entries to 280 characters.
UML
Unified Modelling Language is a set of design methods and tools used for designing and
engineering object-oriented software. These tools include class diagrams, use case diagrams
and interaction diagrams.
Unicode
Unicode is 2 byte code developed to represent all known human language characters on a
computer.
UPS
An Uninterruptible Power Supply is a large rechargeable battery. It maintains sufficient
power to allow a server to keep running until it can shut down cleanly and safely. A UPS also
smoothes the power output coming from the mains to avoid power spikes which would likely
damage a computer.
URL
A Uniform Resource Locator is a string which consists of the protocol + the domain name +
the website file being accessed, for example, http://mysite.com/index.html.
URL
A Uniform Resource Locator is a string which consists of the protocol + the domain name +
the website file being accessed, for example, http://mysite.com/index.html.
Virtual machine
A virtual machine is a software emulation of a computer which can execute programs as
though it were the actual machine.
Virtual memory
Using an area on the hard disk as an extension to RAM. The data in RAM is divided into
pages which swopped in and out of memory from the hard disk whenever the application in
memory requires them. Virtual memory slows down the performance.
Virtual Reality (VR)
Virtual reality (VR) is a simulated experience that can be similar to or completely different
from the real world. Applications of virtual reality include entertainment (particularly video
games), education (such as medical or military training) and business (such as virtual
meetings). Other distinct types of VR-style technology include augmented reality and mixed
reality, sometimes referred to as extended reality or XR
Virtual Private
Network (VPN)
A network implemented via a public network such as the Internet. This enables the user to
log onto a network from a remote location with the same benefits of privacy and security as a
LAN.
Virus
A computer virus is a malicious program that is loaded onto your computer without your
knowledge and runs against your wishes. Viruses can also replicate themselves.
Vlog (Video Blog)
A form of blog which uses video as the medium. Entries normally combine video supported
by text and images.
Vodcast (Video
Podcast)
A form of podcast which includes video clips or photos and is downloaded and played as a
movie.
Voice over Internet
Protocol (VoIP)
A protocol that allows telephone calls to be made over LANs, WANs and the Internet.
WAP
Wireless Application Protocol is an internet based protocol for transferring data to small
handheld devices.
Web 1.0
Earliest stage in the evolution of the WWW, characterised by mostly static content and a
‘read- only’ role on the part of the consumer public.
Web 2.0
The next stage in the evolution of the WWW, characterised by more dynamic content and an
interactive ‘read-write’ role on the part of the consumer public. Content consumers can
become content creators as well, for example, on social networking sites.
Web 3.0
Semantic Web is another name for the Web 3.0.
Wiki
A website where users can collaboratively modify, add or delete its content. Much more than
just an encyclopaedia.
Wi-Max
An upgrade of WiFi technology, allowing for more secure communication at greater speed
over a wider area.
Zombies
A zombie is a computer connected to the Internet that has been compromised by a hacker,
computer virus or Trojan horse and can be used to perform malicious tasks of one sort or
another under remote direction. Botnets of zombie computers are often used to spread e-mail
spam and launch denial-of-service attacks.
Access Modifier
A keyword defining the visibility of a method or field in a class. Private access modifier
indicates that the field or method is only visible inside the class, public indicates it is
available outside the class and protected indicates it is available within the package.
Accessor
A function that returns the value of a private field in an object.
Attribute Fields or property of a class defining the data associated with each object.
Class
A class is the definition used to create instances of itself, called objects. Classes define the
attributes and methods that each object created from that class will have.
Constructor
A constructor is the method which instantiates an object and assigns values to the
attributes/fields of an object.
Encapsulation
Combining fields and methods describing an object into one class.
Helper method
A private method in an object/class. A method which assists/uses another method
Information Hiding
The principle of allowing controlled access to the attributes of an object through methods
(such as gets, sets and toString) while securing those attributes by making them Private or
Protected.
Inheritance
The methods and attributes of a parent class are available to a Child class in order to create
reliable reusable code.
Methods/behaviours
In object-oriented programming, a method (or member function) is a subroutine (or
procedure or function) designed to act on the object’s fields.
Mutator
Commonly known as a set method. A method in object oriented programming which changes
the value of an object’s field/attributes.
Object
An instance of a class created by running the constructor method of the class. The Object
inherits the attributes and methods defined in the class.
OOP design
Object-oriented design is the process of planning a system of interacting objects for the
purpose of solving a software problem. It is one approach to software design.
Overloading
Methods in the same class which have the same name but have different parameters.
Parameters may be of a different type and/or the number of parameters may be different.
Overriding
Methods, one in a parent class and the other in a child class which have the same name and
parameters. The method in the child class is invoked rather than the parent class method